咨询与建议

限定检索结果

文献类型

  • 200 篇 期刊文献
  • 172 篇 会议

馆藏范围

  • 372 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 250 篇 工学
    • 207 篇 计算机科学与技术...
    • 179 篇 软件工程
    • 54 篇 信息与通信工程
    • 35 篇 生物工程
    • 18 篇 控制科学与工程
    • 11 篇 电子科学与技术(可...
    • 11 篇 化学工程与技术
    • 10 篇 光学工程
    • 10 篇 电气工程
    • 7 篇 交通运输工程
    • 7 篇 网络空间安全
    • 6 篇 生物医学工程(可授...
    • 5 篇 机械工程
    • 4 篇 安全科学与工程
  • 133 篇 理学
    • 77 篇 数学
    • 36 篇 生物学
    • 27 篇 统计学(可授理学、...
    • 26 篇 物理学
    • 10 篇 化学
    • 9 篇 系统科学
  • 105 篇 管理学
    • 81 篇 图书情报与档案管...
    • 26 篇 管理科学与工程(可...
    • 11 篇 工商管理
  • 12 篇 法学
    • 10 篇 社会学
  • 6 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 3 篇 教育学
    • 3 篇 教育学
  • 3 篇 文学
    • 3 篇 中国语言文学

主题

  • 19 篇 semantics
  • 13 篇 deep learning
  • 11 篇 knowledge graph
  • 11 篇 graph neural net...
  • 10 篇 information retr...
  • 9 篇 convolution
  • 8 篇 generative adver...
  • 8 篇 forecasting
  • 8 篇 training
  • 7 篇 machine learning
  • 6 篇 learning systems
  • 6 篇 computational mo...
  • 6 篇 feature extracti...
  • 5 篇 conferences
  • 5 篇 deep neural netw...
  • 5 篇 signal encoding
  • 5 篇 computational li...
  • 5 篇 natural language...
  • 4 篇 surveys
  • 4 篇 computer archite...

机构

  • 128 篇 university of ch...
  • 80 篇 cas key lab of n...
  • 63 篇 cas key laborato...
  • 23 篇 school of comput...
  • 17 篇 data intelligenc...
  • 12 篇 institute for ai...
  • 11 篇 institute of com...
  • 10 篇 key lab. of inte...
  • 10 篇 state key lab of...
  • 9 篇 school of comput...
  • 9 篇 key laboratory o...
  • 7 篇 key lab of intel...
  • 7 篇 peng cheng labor...
  • 7 篇 school of cyber ...
  • 6 篇 data intelligenc...
  • 6 篇 semiconductor ne...
  • 6 篇 alibaba group
  • 5 篇 data intelligenc...
  • 5 篇 institute of inf...
  • 5 篇 key laboratory o...

作者

  • 134 篇 cheng xueqi
  • 103 篇 guo jiafeng
  • 48 篇 lan yanyan
  • 40 篇 shen huawei
  • 35 篇 fan yixing
  • 30 篇 pang liang
  • 28 篇 jin xiaolong
  • 28 篇 zhang ruqing
  • 22 篇 cao qi
  • 18 篇 xu jun
  • 17 篇 guan saiping
  • 17 篇 bai long
  • 16 篇 li zixuan
  • 13 篇 xueqi cheng
  • 13 篇 sun xiaoming
  • 10 篇 hou liang
  • 9 篇 huang qingming
  • 9 篇 huang junjie
  • 9 篇 chen wei
  • 8 篇 liu shenghua

语言

  • 353 篇 英文
  • 17 篇 其他
  • 2 篇 中文
检索条件"机构=CAS Key Lab of Network Data Science and Technology Institute of Computing Technology"
372 条 记 录,以下是311-320 订阅
排序:
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado SpringsCO United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China JinYinHu Laboratory Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Zhen Li Ning Wang Deqing Zou Yating Li Ruqian Zhang Shouhuai Xu Chao Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jin YinHu Laboratory Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado Springs Colorado USA Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Meta-Path Hierarchical Heterogeneous Graph Convolution network for High Potential Scholar Recognition
Meta-Path Hierarchical Heterogeneous Graph Convolution Netwo...
收藏 引用
IEEE International Conference on data Mining (ICDM)
作者: Yiqing Wu Ying Sun Fuzhen Zhuang Deqing Wang Xiangliang Zhang Qing He Key Lab of Intelligent Information Processing of Chinese Academy of Sciences (CAS) Institute of Computing Technology University of Chinese Academy of Sciences Beijing China School of Computer Science and Engineering Beihang University China King Abdullah University of Science and Technology Saudi Arabia
Recognizing high potential scholars has become an important problem in recent years. However, conventional scholar evaluating methods based on hand-crafted metrics can not profile the scholars in a dynamic and compreh... 详细信息
来源: 评论
Target-Oriented WiFi Sensing for Respiratory Healthcare: from Indiscriminate Perception to In-Area Sensing
收藏 引用
IEEE network 2024年
作者: Wang, Meng Huang, Jinyang Zhang, Xiang Liu, Zhi Li, Meng Zhao, Peng Yan, Huan Sun, Xiao Dong, Mianxiong Hefei University of Technology Anhui Province Key Laboratory of Affective Computing and Advanced Intelligence Machine School of Computer and Information Hefei230601 China University of Science and Technology of China CAS Key Laboratory of Electromagnetic Space Information Hefei230026 China The University of Electro-Communications Department of Computer and Network Engineering Tokyo1828585 Japan Guizhou Normal University School of Big Data and Computer Science Guiyang550025 China Muroran Institute of Technology Department of Sciences and Informatics 0508585 Japan
Driven by the vision of integrated sensing and communication (ISAC) toward 6G technology, the WiFi-based respiration sensing approach has emerged as a highly competitive candidate for advanced healthcare services. Nev... 详细信息
来源: 评论
D4M: dataset Distillation via Disentangled Diffusion Model
arXiv
收藏 引用
arXiv 2024年
作者: Su, Duo Hou, Junjie Gao, Weizhi Tian, Yingjie Tang, Bowen School of Computer Science and Technology UCAS United Kingdom Sino-Danish College UCAS United Kingdom Department of Computer Science NCSU United States School of Economics and Management UCAS United Kingdom Research Center on Fictitious Economy and Data Science CAS China Key Laboratory of Big Data Mining and Knowledge Management CAS China MOE Social Science Laboratory of Digital Economic Forecasts and Policy Simulation UCAS United Kingdom Institute of Computing Technology CAS China
dataset distillation offers a lightweight synthetic dataset for fast network training with promising test accuracy. To imitate the performance of the original dataset, most approaches employ bi-level optimization and ... 详细信息
来源: 评论
Large Model-Based data Augmentation for Imbalanced Text Classification
Large Model-Based Data Augmentation for Imbalanced Text Clas...
收藏 引用
Artificial Intelligence, networking and Information technology (AINIT), International Seminar on
作者: Dawei Zhang Rongxin Mi Peiyao Zhou Dawei Jin Manman Zhang Tianhang Song School of Computer Science Jiangsu University of Science and Technology Zhenjiang Jiangsu China National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing China Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences (CAS) Beijing China
This study focuses on the application of large models to deal with imbalanced data problems in text classification. In view of the central position of text in web data and the negative impact of class imbalance on cla... 详细信息
来源: 评论
The Minority Matters: A Diversity-Promoting Collaborative Metric Learning Algorithm
arXiv
收藏 引用
arXiv 2022年
作者: Bao, Shilong Xu, Qianqian Yang, Zhiyong He, Yuan Cao, Xiaochun Huang, Qingming State Key Laboratory of Information Security Institute of Information Engineering CAS China School of Cyber Security University of Chinese Academy of Sciences China Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China School of Computer Science and Tech. University of Chinese Academy of Sciences China Alibaba Group China School of Cyber Science and Technology Shenzhen Campus Sun Yat-sen University China Key Laboratory of Big Data Mining and Knowledge Management CAS China Peng Cheng Laboratory China
Collaborative Metric Learning (CML) has recently emerged as a popular method in recommendation systems (RS), closing the gap between metric learning and Collaborative Filtering. Following the convention of RS, existin... 详细信息
来源: 评论
Iterative Channel Estimation for OTFS-based LEO-Sat Communication Using Comb-type ZC Sequences
Iterative Channel Estimation for OTFS-based LEO-Sat Communic...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Haiwei Shi Wang Xing Yiqing Zhou Yu Zhang Shuo Zhou Jinglin Shi State Key Lab of Processors Institute of Computing Technology CAS Beijing China School of Information Science and Technology ShanghaiTech University Shanghai China University of Chinese Academy of Sciences Beijing China Department of Electronic Engineering Tsinghua University Beijing China
In low earth orbit satellite (LEO-Sat) communication systems based on orthogonal time frequency space (OTFS) modulation, existing channel estimation methods usually use high-power pilots, leading to a high peak-to-ave... 详细信息
来源: 评论
ADA-GAD: Anomaly-Denoised Autoencoders for Graph Anomaly Detection
arXiv
收藏 引用
arXiv 2023年
作者: He, Junwei Xu, Qianqian Jiang, Yangbangyan Wang, Zitai Huang, Qingming Key Laboratory of Intelligent Information Processing Institute of Computing Technology CAS Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China Institute of Information Engineering CAS Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Key Laboratory of Big Data Mining and Knowledge Management Chinese Academy of Sciences Beijing China
Graph anomaly detection is crucial for identifying nodes that deviate from regular behavior within graphs, benefiting various domains such as fraud detection and social network. Although existing reconstruction-based ... 详细信息
来源: 评论
Proteomic identification of intact glycopeptides
Proteomic identification of intact glycopeptides
收藏 引用
2016 International Symposium on Analytical Chemistry Frontiers & China-US Analytical Chemistry Workshop
作者: Ming-Qi Liu Wen-Feng Zeng Pan Fang Yang Zhang Wei-qian Cao Jian-Qiang Wu Rui-Xiang Sun Chao Peng Catherine C.L.Wong Si-Min He Peng-Yuan Yang Department Chemistry and Institutes of Biomedical Sciences Fudan University Key Lab of Intelligent Information Processing of Chinese Academy of Sciences (CAS) Institute of Computing Technology CAS and University of Chinese Academy of Sciences National Center for Protein Science (Shanghai) Institute of Biochemistry and Cell Biology Shanghai Institutes for Biological Sciences CAS
We have developed a workflow that robustly identifies intact glycopeptides at a proteome scale using stepped-energy mass-spectrometry. This workflow has decoded as a computational strategy called as pGlyco+, a dedicat... 详细信息
来源: 评论